WEBVTT

00:00.160 --> 00:01.640
Hi, I'm Natalie.

00:02.200 --> 00:08.120
Throughout my career in cyber security, whether serving in Israel's Unit eight 200 discover in zero

00:08.120 --> 00:12.480
days or building my own security company, I kept noticing the same gap.

00:12.720 --> 00:18.240
Many professionals deeply understood vulnerabilities from the outside, but lacked a real understanding

00:18.240 --> 00:22.160
of how exploits, especially zero days, worked from the inside.

00:22.680 --> 00:29.160
That's why I created this course, to share the hands on practical skills I've learned so you can deeply

00:29.160 --> 00:33.560
grasp how software exploitation truly happens and how to stop it.

00:34.360 --> 00:40.520
You'll go hands on with real code and Linux environments to learn how attackers exploit vulnerabilities

00:40.520 --> 00:48.120
like stack overflows, ROP chains, and heap spraying, and how modern defenses try to stop them.

00:49.000 --> 00:55.280
We'll walk through these techniques step by step, using visual examples and analogies that make even

00:55.320 --> 00:57.680
advanced concepts easy to follow.

00:58.280 --> 01:05.160
By the end of the course, you'll know how to hijack execution using stack overflows, build and analyze

01:05.200 --> 01:12.560
options, perform heap layout manipulation and function pointer attacks, understand defenses like Aslr

01:12.600 --> 01:20.640
and NX, bit canaries and CFI, and most importantly, think like an attacker and defend like one two.

01:21.440 --> 01:27.160
Whether you are a security researcher, a developer, or just curious how real exploits work, this

01:27.160 --> 01:33.640
course will give you the skills and mindset to go deeper into software security in the most simple,

01:33.800 --> 01:36.840
easy to follow way with hands on exercises.

01:37.440 --> 01:39.480
Click enroll and let's get started!
